Deck 14: Using Technology to Manage Information

Full screen (f)
exit full mode
Question
A(n) ____________ gives support to businesspeople during the decision-making process.

A) database
B) management information system
C) decision support system
D) expert system
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a software program that performs the specific tasks that the user wants to carry out?

A) consumer software
B) enterprise software
C) application software
D) presentation software
Question
The executive responsible for managing a firm's information systems and related computer technologies.

A) IVP
B) CIS
C) PIT
D) CIO
Question
SpaceX and Airbnb are examples of companies referred to as _________________ which use innovative business models to bring about disruption in a particular industry.

A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
Question
Which of the following is not one of the components of a computer-based information system?

A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
Question
A(n) _________ is a management support system that imitates human thinking through "if-then" rules.

A) decision support system
B) management information system
C) executive support system
D) expert system
Question
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.

A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
Question
The application software that would be best suited for creating a sales presentation is

A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
Question
How is data different from information?

A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
Question
All of the following are examples of application software except:

A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
Question
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
Question
A smart phone is a device that combines a cell phone with a PDA.
Question
Computer-based information systems consist of all of the following components except

A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
Question
Technology is allowing firms to track business activities almost instantaneously. Package delivery companies such as FedEx and UPS use __________ to transmit information within seconds to the package sender.

A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
Question
All of the following are ways technology has forever changed today's business except:

A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
Question
An information system should ______________________________________.

A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
Question
Information that can be stored and retrieved for use is kept in a __________.

A) server
B) data system
C) information system
D) database
Question
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.

A) data information system
B) expert system
C) data processing system
D) information system
Question
The fourth industrial revolution has been powered by _____________________________.

A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
Question
The heart of any information system is its ______________________________.

A) information system
B) database
C) DSS
D) ESS
Question
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called _____________________________________.

A) virtual private network
B) dial-up
C) Skype
D) VoIP
Question
The current standard for wireless networks is called a _______________________________.

A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
Question
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform

A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
Question
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
Question
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering

A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
Question
The first step in off-site data storage is ________________________________.

A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
Question
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
Question
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes, is referred to as (a) ______________________.

A) Trojan horse
B) cookie
C) spyware
D) botnet
Question
WANs are networks designed to connect a company's employees on multiple floors of an office high-rise.
Question
JetBlue reservation agents work in ___________, an example of a ___________.

A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
Question
_________ can be an outcome of poorly protecting employee or customer data.

A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
Question
A Trojan horse ______________________________________________.

A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
Question
All of the following are examples of e-crimes except:

A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
Question
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.

A) database management
B) cloud computing
C) grid computing
D) on-demand computing
Question
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.

A) Trojan horse
B) cookie
C) worm
D) virus
Question
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a

A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
Question
A computer network that is similar to the Internet but limits access to authorized users is referred to as which of the following?

A) firewalls
B) intranets
C) extranet
D) virtual private network
Question
MAC users are less vulnerable to cybercrimes because of storage of data in the cloud rather than on hard drives.
Question
Any malicious software program designed to infect computer systems is referred to as (a):

A) Trojan horse.
B) cookie.
C) malware.
D) virus.
Question
A computer network that connects machines within limited areas, such as a building or several nearby buildings, is called a ______________________________________.

A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
Question
A network of smaller computers that run special software is referred to as ???_____________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
Question
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.

A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
Question
Virtual offices are trend-driven and are becoming less used by businesses.
a) True
b) False
Question
Another term used for on-demand computing is ______________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
A(n) ____________ gives support to businesspeople during the decision-making process.

A) database
B) management information system
C) decision support system
D) expert system
C
2
Which of the following is a software program that performs the specific tasks that the user wants to carry out?

A) consumer software
B) enterprise software
C) application software
D) presentation software
D
3
The executive responsible for managing a firm's information systems and related computer technologies.

A) IVP
B) CIS
C) PIT
D) CIO
D
4
SpaceX and Airbnb are examples of companies referred to as _________________ which use innovative business models to bring about disruption in a particular industry.

A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not one of the components of a computer-based information system?

A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) _________ is a management support system that imitates human thinking through "if-then" rules.

A) decision support system
B) management information system
C) executive support system
D) expert system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.

A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
The application software that would be best suited for creating a sales presentation is

A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
How is data different from information?

A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following are examples of application software except:

A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
A smart phone is a device that combines a cell phone with a PDA.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Computer-based information systems consist of all of the following components except

A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Technology is allowing firms to track business activities almost instantaneously. Package delivery companies such as FedEx and UPS use __________ to transmit information within seconds to the package sender.

A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
All of the following are ways technology has forever changed today's business except:

A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
An information system should ______________________________________.

A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Information that can be stored and retrieved for use is kept in a __________.

A) server
B) data system
C) information system
D) database
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.

A) data information system
B) expert system
C) data processing system
D) information system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
The fourth industrial revolution has been powered by _____________________________.

A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
The heart of any information system is its ______________________________.

A) information system
B) database
C) DSS
D) ESS
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called _____________________________________.

A) virtual private network
B) dial-up
C) Skype
D) VoIP
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
The current standard for wireless networks is called a _______________________________.

A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform

A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering

A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
The first step in off-site data storage is ________________________________.

A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes, is referred to as (a) ______________________.

A) Trojan horse
B) cookie
C) spyware
D) botnet
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
WANs are networks designed to connect a company's employees on multiple floors of an office high-rise.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
JetBlue reservation agents work in ___________, an example of a ___________.

A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
_________ can be an outcome of poorly protecting employee or customer data.

A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
A Trojan horse ______________________________________________.

A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
All of the following are examples of e-crimes except:

A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.

A) database management
B) cloud computing
C) grid computing
D) on-demand computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.

A) Trojan horse
B) cookie
C) worm
D) virus
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a

A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A computer network that is similar to the Internet but limits access to authorized users is referred to as which of the following?

A) firewalls
B) intranets
C) extranet
D) virtual private network
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
MAC users are less vulnerable to cybercrimes because of storage of data in the cloud rather than on hard drives.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
Any malicious software program designed to infect computer systems is referred to as (a):

A) Trojan horse.
B) cookie.
C) malware.
D) virus.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
A computer network that connects machines within limited areas, such as a building or several nearby buildings, is called a ______________________________________.

A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
A network of smaller computers that run special software is referred to as ???_____________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.

A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Virtual offices are trend-driven and are becoming less used by businesses.
a) True
b) False
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Another term used for on-demand computing is ______________.

A) cloud computing
B) grid computing
C) utility computing
D) super computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 44 flashcards in this deck.